wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Abhijit Rajpurohit
Jul 11, 2023
0 Likes
0 Discussions
96 Reads

Virtual memory is a way of representing your memory that's abstracted from the physical memory on your machine. It makes use of both your RAM and your storage space, whether that's on a traditional hard drive or an SSD. In Linux, this is done at the kernel and hardware levels².

Linux supports virtual memory, that is, using a disk as an extension of RAM so that the effective size of usable memory grows correspondingly. The kernel will write the contents of a currently unused block of memory to the hard disk so that the memory can be used for another purpose¹.

Virtual memory takes advantage of the fact that not all of the memory that's being used in theory is being used all of the time. Programs in memory are broken down into pages and the parts that the kernel deems as unnecessary are "swapped out," or moved to the hard drive. When they're needed, they can be "swapped in," or brought back into RAM².

The space used for virtual memory on a drive is known as "backing store," or "swap space." In the Windows world, it's usually implemented as a file, known as a "swap file." It's also possible to do this in Linux, but it's much more common to use a dedicated disk partition².

The upshot of virtual memory is that it's possible to run large programs by using more memory than the physical RAM in your machine. Virtual memory also allows developers to create applications without having to know how a computer's memory is organized².

The main downside historically with virtual memory has been that hard drives have been slower than RAM. If a machine doesn't have enough RAM, the system can keep swapping pages in and out endlessly, a process known as "thrashing." This is less of an issue on modern PCs with more RAM and faster SSDs displacing mechanical hard drives, but it's still something to be aware of


Comments ()


Sign in

Read Next

THREADS (assignment 1)

Blog banner

File system implementation

Blog banner

ASANA- A Management System.

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Some web vulnerabilities

Blog banner

Rain bow

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Jira Software

Blog banner

AOL Mail

Blog banner

Smartsheet

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Microsoft Word

Blog banner

Intrusion Detection System

Blog banner

Deadlock in operating system

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Lucidchart

Blog banner

Evolution of Operating Systems

Blog banner

What is thread and alse multithreading

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Deadlock and Starvation

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Khau Galli – Vile Parle

Blog banner

IoT Evolution

Blog banner

Deadlock

Blog banner

Memory heirachy (Operating system)

Blog banner

evolution of operating system - Disha Parekh

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Product Discount Calculator

Blog banner

Security in Operating Systems

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Real Time Scheduling

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

NETSUITE

Blog banner

CSI and Organizational Change

Blog banner

A buffer overflow

Blog banner